When: Dec 07 2010
Presenting: Jamie Sumner, Strategic Planning Manager, Anti-Theft Services, Intel
The boundaries separating work, home and play have become more and more blurred. Mobility, once a nice-to-have capability, is increasingly important for business strategy, while, simultaneously increasing risk of theft and data loss.
When: Dec 07 2010
Presenting: Matt Dieckman; SonicWALL, Secure Remote Access, Product Manager
The proliferation of end user devices combined with the need for employees to work at any time, from any location has resulted in the mobile workforce accessing critical network resources from an unprecedented variety of end points.
When: Dec 14 2010
Presenting: Justin Clarke, London Chapter Leader, OWASP
Justin Clarke is an information security consultant with years of experience in assessing the security of networks, web applications and wireless infrastructures for large financial, retail, technology and government clients in the United Kingdom, the United States and New Zealand.
Held: Jul 08 2010 4:00 am
Presenting: Ron Condon, UK Bureau Chief, TechTarget
Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.
Held: Jul 08 2010 6:00 am
Presenting: Mark Henshaw, Director ISACA London, Chairman ISACA Winchester
Intrusion Prevention- are we joking?
- When your business is a target, can you really prevent sponsored intrusion?
Held: Jul 08 2010 12:00 pm
Presenting: Mike Fratto; Network Computing, Editor
Before you can prevent an attack, you have to detect it. Traditional signature based IDS's are prone to false positives and can only detect malicious traffic it has signatures for.
Held: Jul 08 2010 4:00 pm
Presenting: C. Matthew Curtin, Interhack, Founder
Intrusion prevention technology is understandably focused on using network data to detect and to stop intrusions in progress. When (not if) intrusion prevention systems fail to prevent intrusions, can they provide any value to the management of an incident?
Recorded: 28 Jan 2010
Presenting: Dennis Boas, Security Solutions, Enterasys Networks
Abstract: In today's networked world, critical data is stolen in real time. Bots, viruses and denial of service attacks propagate at network speeds. Escalating adoption of wireless, social networking, cloud computing and virtualization technologies increases your security risk. The only effective threat mitigation strategy is an automated real time response that stops the attack and prevents the attacker from trying again. This webinar discusses effective, automated threat mitigation and IPS solutions for enterprise networks and cyber-speed threats.